Teaching@FSM

Serving as a temporary teacher at FSM "Faculté des Sciences de Monastir" for Master 2 "Systèmes de raisonnement automatique" where I teach the course of "Cryptography and security Techniques".

A course inspired from many ressources in the internet and principally from the book Cryptography And Network Security 4th Edition 2005 by William Stallings.

- Monday 13 October 2014 :

- Part 1: Introduction to security

keywords: attacks, security services, threats, DoS, spywares, virus, TCP flooding, ARP spoofing and flooding, DHCP starvation,..

Download it from here : chap1 (1 slide/page) or chap1 (4 slides/page)

- Part 2: Classic cryptography

keywords : Terminology, cryptanalysis, classic attacks, brute force attack, COA, CPA, CCA, KPA, side channel attacks, Cesar, Monoalphabetic ciphers, Playfair, Polyalphabetic ciphers, Vigenère, Substitution, transposition, PRNG, Vernam, One time pad, Product ciphers

Download it from here : chap2 (1 slide/page) or chap2 (4 slides/page)

- Part 3: Modern cryptography : symmetric ciphers

keywords : Modern ciphers, bloc ciphers, stream ciphers, Confusion & diffusion, Feistel cipher, DES, 2DES, meet-in-the-middle attack, 3DES, AES, Modes of bloc encryption, ECB, CBC, CFB, OFB, CTR

Download it from here : chap3 (1 slide/page) or chap3 (4 slides/page)

- Monday 20 October 2014 :

- Part 4: Modern cryptography : Public key ciphers

keywords : Pinciples of public key cryptography, confidentiality and authentication, RSA, Fast exponentiation, Diffie-Hellman key

exchange, man-in-the-middle-attack, ElGamal Cipher

Download it from here : chap4 (1 slide/page) or chap4 (4 slides/page)

- Part 5: Hash, MAC & digital signature

keywords : hash, Anniversary Paradox, Message authentication, integrity, MD5, SHA-1, SHA-2, MAC, HMAC, PRNG based on MAC, digital signature : creation and verification, DSA of DSS

Download it from here : chap5 (1 slide/page) or chap5 (4 slides/page)

- Monday 27 October 2014 :

- Part 6: Key distribution and Management

keywords : Secret key distribution: KDC, hybrid algorithm, diffie-hellman exchange. publickey distribution: public announce, public directory, Authority of certification, certifcates, X.509, PKI, Authentiation user protocols, Kerberos

Download it from here : chap6 (1 slide/page) or chap6 (4 slides/page)

- Part 7: Open Research Topics in cryptography related applications

keywords : Chaos based cryptography, attacks on chaotic cryptosystems, Joint encryption and compression, Robust image

watermarking for copyright protection, semi-fragile watermarking for integrity control,

Download it from here : chap7 (1 slide/page) or chap7 (4 slides/page)

- Monday 17 november 2014

- list of exrcices (pdf)

Correction (pdf)

- en earlier corrected list of exercices : (pdf)

Supplements :

I like this video talking about finding the modular inverse of a number: Demonstration of the extended Eucludian algorithm